20500+ entries in 0.177s
deedbot: saturn
_ voiced for 30 minutes.
deedbot: ben
_vulpes unrated agustin.
deedbot: ben
_vulpes unrated vvande.
deedbot: ben
_vulpes unrated solrodar.
deedbot: ben
_vulpes unrated smickles.
deedbot: ben
_vulpes updated rating of danielpbarron from 1 to 3 << his worship
deedbot: ben
_vulpes unrated ang-st.
deedbot: ben
_vulpes unrated mthreat.
deedbot: ben
_vulpes updated rating of hanbot from 2 to 4 << legendary valkyrie
deedbot: ben
_vulpes updated rating of mike
_c from 3 to 1 << lost, but not forgotten
deedbot: ben
_vulpes updated rating of lobbes from 3 to 3 << staunch sapper
deedbot: ben
_vulpes updated rating of mod6 from 4 to 5 << foundation co-chair
deedbot: ben
_vulpes updated rating of trinque from 4 to 6 << against every creature, living or dead
deedbot: ben
_vulpes updated rating of mircea
_popescu from 4 to 5 << master of the realm
deedbot: ben
_vulpes unrated kakobrekla.
trinque: spyked: any chance you want to do mircea
_popescu's requested RSS bot? I've got plenty on my plate as it stands.
trinque: I will at least say mircea
_popescuine features come way first.
trinque: !!gettrust ben
_vulpes trinque
a111: Logged on 2014-11-13 23:07 mircea
_popescu: In the days when Sussman was a novice, Minsky once came to him as he sat hacking at the PDP-6.
a111: Logged on 2018-04-12 18:10 mircea
_popescu:
http://btcbase.org/log/2018-04-12#1797142 << understand, the discussion here is re cryptographic hardness, not mathematical hardness ; as discussed otherplaces in the logs, the mathematical notion of difficulty is "what's the absolute hardest case this problem can yield", because they want to offer maximal flop guarantees ; cryptographically it is kinda opposite : what's the LOWEST difficulty a problem in this class may yield
BingoBoingo: ben
_vulpes: That think was the commercial item that defines the standard
BingoBoingo: <ben
_vulpes> i have been seduced into liking sugary delights! << It's scarcely been more than a month since a fractional alfajore gave you sugar shock
a111: Logged on 2018-04-12 16:12 zx2c4: things like RSA boil down to number theory problems. but that's in a sense scarier than the set of problems that good block ciphers tend to boil down to. because it means that those primitives have lots of
_structure
_, and generally structure is something that can be exploited. just look at all the amazing and fantastic attacks on things with structure. so just boiling down to a [currently considered] "hard problem" doesn't provide as much solace
mircea_popescu: ben
_vulpes all the Order deny,allow Deny from all Allow from x thing does is lock out by ip ; it's not even generated by wp itself ; it can be implemented any way, iptables, csf, whatever.
mircea_popescu: RewriteCond %{REQUEST
_FILENAME} !-d << this sort of thing.
mircea_popescu: ben
_vulpes wp doesn't actually care how .htaccess is implemented ; only that it works.
ben_vulpes: mircea
_popescu: the .htaccess files included with/generated by mpwp include the `Allow` incantation, which is not a thing in apache 2.4; trilema purports to run on 2.4.16; can the Order/Allow incantations be replaced with the 2.4-style Require?
mircea_popescu: ben
_vulpes you should see the britt chocolate covered macadamia nuts.
ben_vulpes: well they are a far cry from the mango gelato of mircea
_popescu's haremfactory but goshdarn these alfajores are magical with coffee in the morning
zx2c4: i suppose your point is that you
_could
_ choose to obscure the lengths of the messages youre sending back? whereas with zero that isnt a possibility?
zx2c4: mircea
_popescu: padded protocols infoleak in multiples of the padding. you get to see if a given packet elicited a 0 reply, a 16 reply, a 32 reply, a 48 reply, and so forth
zx2c4: mircea
_popescu: see logs
zx2c4: mircea
_popescu: an attacker can also distinguish between a length 15 message and a length 31 message. i still maintain this doesnt give an attacker anything useful
zx2c4: there
_are
_ attacks, on say voice compression algorithms, which can gather some information from having precise sizes alone, which is why things are padded to nearest 16. but i dont see what would be gathered by what youre suggesting
zx2c4: noise defines several different handshakes. wireguard uses Noise
_IKpsk2, which is 1-RTT. But there are other noise handshakes, some of which are 0-RTT, 1-RTT, 2-RTT, 1.5-RTT, and so forth. each handshake message can optionally contain a payload -- to contain things like, say, certificates or other data. the question is at which stage of the handshake do you use the payload parameter? if you do it too early in some, you get zero confidentiality. so
a111: Logged on 2018-04-11 16:11 asciilifeform: mircea
_popescu: picture if the selector on kalash had a 'fires backwards' position.
zx2c4: wireguard uses Noise
_IKpsk2
mircea_popescu: speaking of which and ben
_vulpes boyhood dreams, ssto and so on : i dreamt last night that someone actually managed to create that true wunderwaffen material, the composite/ceramic with higher tensile strength than steel, but negligible caloric conductivity. making some iiiincredible jet engines.
zx2c4: well, feel free to keep filling up my wallet, say, with thousands of coins O
_o
a111: Logged on 2018-04-12 16:32 mircea
_popescu: now let's look at the logs :
zx2c4: mircea
_popescu: no, thought it was quite productive actually
zx2c4: hello mircea
_popescu
zx2c4: things like RSA boil down to number theory problems. but that's in a sense scarier than the set of problems that good block ciphers tend to boil down to. because it means that those primitives have lots of
_structure
_, and generally structure is something that can be exploited. just look at all the amazing and fantastic attacks on things with structure. so just boiling down to a [currently considered] "hard problem" doesn't provide as much solace
☟︎ zx2c4: key compromise impersonation is what happens when somebody steals your private key, and then can impersonate anybody else
_to
_ you
zx2c4: hello. mircea
_popescu asked me to come here for two hours to field some questions about wireguard from you all. i'm not very familiar with this channel or the community in it, but i am happy to talk to whomever about wireguard. so let's start the timer now?
a111: Logged on 2018-04-12 04:24 mircea
_popescu: and in other logs, "CL-Feed-Parser/0.0.00 (SBCL 1.4.5; Linux;"
a111: Logged on 2018-04-12 01:31 mircea
_popescu: spyked but why would it be difficult in that way ?
a111: Logged on 2017-08-19 18:25 mircea
_popescu: are you aware i think your "formal" model is a piece of shit from paragraph one ?
mircea_popescu: ben
_vulpes do you realise the 0.5 is measured through dns and all that ? did you do same with nginx ?
ben_vulpes: mircea
_popescu: nginx can serve hanbots in .01s, not the .6 of apache
mimisbrunnr: Logged on 2018-04-12 06:49 ben
_vulpes: hanbot danielpbarron: apache with mod
_php is, sadly, much slower than the nginx setup we've had until now. however now we can move forward with getting your .htaccess files set up and uploads and such. i'm going to knock off for now but please let me know how i can support your mp-wp projects next.
ben_vulpes: mircea
_popescu: thank you so very very much.
mircea_popescu: anyway ben
_vulpes here's where you thank me profusely for having saved you dicking about with entirely nonbroken stacks for an alfternity.